sprout-uci / vrasedLinks
☆21Updated 3 years ago
Alternatives and similar repositories for vrased
Users that are interested in vrased are comparing it to the libraries listed below
Sorting:
- On the TOCTOU Problem in Remote Attestation☆15Updated last year
- The top repository for the code accompanying our paper "Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Executi…☆15Updated 3 years ago
- Using Malicious #VC Interrupts to Break AMD SEV-SNP (IEEE S&P 2024)☆25Updated last year
- TPM attestation client and server for TPM 20. and TPM 1.2, including enrollment, attestation, and a web UI.☆16Updated 9 months ago
- Teaching materials related to the Tamarin Prover☆71Updated last year
- Calculate AMD SEV/SEV-ES/SEV-SNP measurement for confidential computing☆70Updated 2 months ago
- This repo tracks a compatible state of all sev step components and contains script to easily install everything required to setup a sev v…☆43Updated last year
- Protecting Accelerator Execution with Arm Confidential Computing Architecture (USENIX Security 2024)☆26Updated last year
- Main source code repository of the Tamarin prover for security protocol verification.☆486Updated last week
- Breaking Confidential VMs with Malicious Interrupts (USENIX Security 2024)☆34Updated last year
- Verifying OpenTitan☆27Updated 2 years ago
- ☆25Updated 2 years ago
- Compiler-based tool that protects Intel SGX applications against controlled-channel attacks☆27Updated 8 years ago
- ☆22Updated 2 years ago
- ☆42Updated last month
- ☆26Updated 8 months ago
- Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves☆54Updated 8 months ago
- Low-TCB Linux Applications with SGX Enclaves☆37Updated 6 years ago
- This repository contains specifications, proof scripts, and other artifacts required to formally verify portions of AWS libcrypto. Formal…☆59Updated 2 weeks ago
- A rust implementation for DMTF SPDM protocol to support Confidential Computing☆47Updated this week
- Minimal RISC Extensions for Isolated Execution☆53Updated 6 years ago
- ☆33Updated last month
- ☆59Updated 2 months ago
- An on-device confidential computing platform☆131Updated this week
- A formally verified security module for AMD confidential VMs☆58Updated last week
- Formally-verified reference monitor for a secure isolated execution ("enclave") environment on ARM TrustZone☆109Updated 3 years ago
- Crypto library☆66Updated this week
- A repository of tools for verifying constant-timeness☆18Updated 9 months ago
- Build Trusted Chain for Cloud Native in Confidential Computing Envrionment☆18Updated 9 months ago
- Meeting materials☆16Updated this week